Drone takes a different approach when it comes to passive Open Source Intelligence (OSINT). It is built provide actionable intelligence on limited sources, not trying to collect "all the things". My belief is that you can be just as effective on social engineering, penetration testing, and user awareness training with smaller sets of data.

An example of smaller data sets is Drone only looks through the top 100 search results for LinkedIn. Sure there could be thousands of results for any organization, but 100 will suffice for an successful attack. Drone also take a similar approach with hosts, it only tries to identify the low hanging fruit and attack scenarios that are likely to happen.

Drone shouldn't be viewed as a final product when it comes to a security assessment or attack surface. The attack surface report can be used to bootstrap assessments and their reports. Drone can also be used to educate students, organizations, and especially management on attack surface, threat modeling, and OSINT.

Drone intentionally offers less in order to provide more value which is a key principle taught in Rework. I believe the organizations are inundated with too much information and struggle to make decisions to improve security. Too many tools focus on scenarios that are "highly" unlikely to ever happen. Sometimes less is better.

Instead of building tools that provide information to feed into other tools, I'm building tools for humans. You can follow the journey at www.threatagent.com.